RM Assignment II LR Report
RM Assignment II LR Report
ID Number 52212114401
Date
11/5/2017
1. Analyze the needs to explore the material related to the research topic.
2. Able to express & comment on the identified LR.
3. Applied the hypothesis & decide on testing and design experiment.
1
ASSIGNMENT 2 (LITERATURE REVIEW)
Write a literature review based on the title and problem statement that you have submitted in
Assignment I. The LR report must consist of review of literature including case study comparison, proper
citation using APA style and proper references. You must include in your report (as appendix) the
original articles that you have chosen for your literature review. The literature review must be at least 4
pages (including references). Appendixes are not counted as part of the minimum 4 pages. Please print
and submit the assignment INDIVIDUALLY and save your report in a PDF format. The deadline is Friday
th
12 May 2017 . Late submission will be given 0 mark.
Rubric:
Total:
OVERVIEW
Literature review was done all through the entire project to gain information,
knowledge and skill expected to complete this whole project. The principle hotspots for
this project are the previous project and thesis that is related to this project.
Furthermore, the other sources are books, journals and articles obtained from the
Internet. This chapter discuss the projects and this related to this project. This chapter
also discuss a related researches conducted by previous project in the world.
From analysis, the project did by other researchers also have certain weakness. It
is vital to enhance and to develop a decent project. This project additionally will suggest
some future works that should be possible to enhance the same project. There are
some helpful ideas that can be implemented in this project from other similar projects.
INTRODUCTION
Home security has been a noteworthy issue where crime and wrongdoing is
increasing and needs to take legitimate measures to prevent intrusion. In addition, there
is need to automate home so that the user can that advantage of technological
advancement.
A model of the system is shown in Figure 1, that provide security to home, office,
or building etc via SMS using GSM technology, Internet Based Monitoring System and
alarm system.
(Pinterest,2009)
SEARCH STRATEGY
It is important to choose the right resources to collect information for a study.
Databases, library catalogues, and Internet search engines can be used for a literature
search. I used multiple research databases including Emerald Insight, ProQuest, and
Google Scholar. Keywords searched were security, home security, home automation,
home security system, wireless home security system, security system using Arduino
and internet based monitoring system.
RESEARCH FROM PREVIOUS PROJECT
According to Logeswaran (Logeswaran A/L Arumugam,2009), the project was
developed to design the home security by alarm system. The alarm system should
check the status of the transmitter of the system regularly to ensure that the system
could function without any failure. The failure of the transmitter will be indicated at the
receiver through LEDs and the buzzer beeping sound. The project is to develop an
alarm system for a house.
The system can be operated through a password secured remote control. The
remote can arm and disarm the whole system or each individual zone. The components
that the project used are PIC16F877A microcontroller, encoder HT12E, LCD, 4X4
keypad, transmitter and receiver module.
There are some limitations in this project is only one transmitter and one receiver
is built for this project cannot perform bi-directional communication which allowed the
receiver to send signals to transmitter to request the status of the transmitter because
the communication between the transmitter and the receiver is only one way
communication.
In 2007, Rosli bin Mamat is working on developing a project by using the RF
transmission and the project cover 4 to 5 zones (Rosli bin Mamat,2007). The
components that this project used are encoder, voltage regulator, RF module, Antenna,
decoder, PIC 16F877A microcontroller and alarm. Figure 2 showed the overall process
of the project.
The project limitations are:
1. Expensive due to the voltage regulator is an end product purchased from the
market.
2. Big in size.
3. Encoder-decoder not fully utilized, 15 data only used for 5 zones.
4. The PIC micro-controller which can do more functions beside trigger alarm.
5. Difficult to control because the system can be activated and deactivated through
switching the power supply only.
There are some limitations in this project which are the given alarm system
determines the presence of the intruder only, and does not determine how many
persons are in there actually. Besides that, the alarm activates only when the person
cuts through the line of the PIR sensor.
In 2004, Chun-Pai, Jimmy Hsieh and Yang Cao has been working on Home
Security System The project is a digital home security system with voice feature which
can monitor room temperature, smoke, motion, windows and doors (Chun-Pai, Jimmy
Hsieh, Yang Cao,2004). This project built a wired home security system using different
type of sensors. The project using the traditional magnetic switch equipped on doors
and windows. Besides that, the project also using the temperature sensor, smoke
detectors, and motion sensor. In this project the security system will sound an alert
when there is an attempt of break-in or if there is possible smoke or fire.
This project is built without considering how the owner of the system could switch
off the system when he enters the armed house from outside. This is because the main
control unit of the system is attached inside the house.
REFERENCES